HEDup: Secure Deduplication with Homomorphic Encryption

被引:0
|
作者
Miguel, Rodel [1 ]
Aung, Khin Mi Mi [1 ]
Mediana [2 ]
机构
[1] ASTAR, Data Storage Inst, Data Ctr Technol Div, Singapore, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
来源
PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS) | 2015年
关键词
Data Deduplication; Homomorphic Encryption; Confidentiality; Cloud Storage; Key Server;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deduplication on encrypted data is a promising trend for both cloud storage providers and subscribers. Data deduplication allows cloud storage providers ( CSP) to save storage space by eliminating the copies of the same data. Data encryption can ensure the confidentiality of customer's data both in transit and at rest. However, deduplication that works on detecting identical data does not work well with encrypted data provided by conventional encryption. Encryption of the same data using different key ( by different subscribers) will result in different ciphertexts that will not allow the CSP to carry out deduplication. In this paper, we propose a scheme to allow deduplication on encrypted data with the aid of a key server deployed at cloud service provider premises, called HEDup ( Homomorphic Encryption Deduplication). In this solution, the subscriber encrypts data with data-encryption key obtained from key server via various key-management schemes, one of which uses homomorphic encryption. The main contributions of this project are ( 1) with a key server deployed at cloud provider premises, it will not only deduplicate data from particular domain but also for the CSP's entire client base including public and different enterprise users - this results in higher storage savings and ( 2) data owners still maintain exclusive control of their data and data-encryption keys, i.e. CSP has no access to any of it - strong confidentiality guarantees. The experiments conducted show that data uploads and downloads using HEDup have minor storage and latency overhead. Our implementation also shows significant performance optimization when compared to commercial key management service for cloud object storage.
引用
收藏
页码:215 / 223
页数:9
相关论文
共 50 条
  • [21] Threshold Homomorphic Encryption From Provably Secure NTRU
    Xu, Kexin
    Hong Meng Tan, Benjamin
    Wang, Li-Ping
    Mi Mi Aung, Khin
    Wang, Huaxiong
    COMPUTER JOURNAL, 2023, 66 (12) : 2861 - 2873
  • [22] Secure Cloud Data Deduplication with Efficient Re-Encryption
    Yuan, Haoran
    Chen, Xiaofeng
    Li, Jin
    Jiang, Tao
    Wang, Jianfeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 442 - 456
  • [23] A Secure Cloud Computing Architecture Using Homomorphic Encryption
    Benzekki, Kamal
    El Fergougui, Abdeslam
    El Alaoui, Abdelbaki El Belrhiti
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 293 - 298
  • [24] EFFICIENTLY SECURE MULTIPARTY COMPUTATION BASED ON HOMOMORPHIC ENCRYPTION
    Yao, Yuangang
    Wei, Jinxia
    Liu, Jianyi
    Zhang, Ru
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 343 - 349
  • [25] Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
    Barbosa, Manuel
    Farshim, Pooya
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 296 - +
  • [26] Secure generalized Vickrey auction using homomorphic encryption
    Suzuki, K
    Yokoo, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 239 - 249
  • [27] DICE: A Dual Integrity Convergent Encryption Protocol for Client Side Secure Data Deduplication
    Agarwala, Ashish
    Singh, Priyanka
    Atrey, Pradeep K.
    2017 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2017, : 2176 - 2181
  • [28] Secure Image processing using LWE Based Homomorphic Encryption
    Challa, RatnaKumari
    VijayaKumari, G.
    Sunny, B.
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [29] Secure searching of biomarkers through hybrid homomorphic encryption scheme
    Kim, Miran
    Song, Yongsoo
    Cheon, Jung Hee
    BMC MEDICAL GENOMICS, 2017, 10
  • [30] A homomorphic encryption-based secure electronic voting scheme
    Huszti, Andrea
    PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 479 - 496